A deep dive into a real-world GuLoader malware incident disguised as a Swift payment request
I didn’t expect a cyber attack disguised as a Swift transaction to land in my inbox. But on July 10, 2025, I received a very polished email that claimed to be from a business contact, complete with official-sounding language, phone numbers, and even a company website.
The subject?
“Fw: Swift Copy:0008/025/05/06_dt.07/09/25 by SANWAR MAL SUREKA Insurance & Investment Advisors”
The message claimed to be from “Sreekumar K S” of Mor Aqua Fresh, referencing an overdue balance and requesting payment confirmation. It included a password-protected .lzh archive, presented as supporting documentation, and even provided a password for access — a tactic often used in legitimate financial correspondence.
At first glance, everything seemed in order: the email was polite, well-formatted, and included branding and contact numbers. But behind the professional facade lurked something far more sinister.
This was no payment request — it was a delivery mechanism for GuLoader, a sophisticated malware dropper often used to load Remote Access Trojans (RATs), credential stealers, and surveillance tools. What followed was a deep dive into obfuscation, memory injection, and the kind of social engineering that even seasoned professionals must stay vigilant against.
In this post, I’ll walk you through how I analyzed the threat, uncovered its behavior, and understood how it cleverly slipped past even Gmail’s robust security filters.
GuLoader (also known as CloudEyE) is a popular malware loader first observed in 2019. It is commonly used to:
It typically arrives via phishing emails and employs techniques like:
The malware is widely sold on underground forums and used by various threat groups due to its modularity and stealth.
The email came from a legit-looking Gmail address (as21185@gmaildotcom
) with valid SPF, DKIM and DMARC authentication.
Once extracted using the password, the “.lzh” file revealed a Windows executable:
Attached File
091208478 DTD 10.07.2025 09750913 640976289-85665.exe
(inside .lzh)310921680
Metadata:
This is consistent with GuLoader characteristics – fake metadata, NSIS-based shellcode loader and packing to avoid detection.
TRiD:
Behaviour Summary (from Any.Run)
system.dll
) to %TEMP%
VirtualAlloc
, WriteProcessMemory
, Createthread
for shellcode injectionwmlaunch.exe
, slui.exe
)Although the report showed no plaintext C2 domain, analysis indicates that GuLoader:
Even without clear C2 in strings, the behaviour matches known GuLoader indicators:
GuLoader is a loader trojan sold on underground markets. It’s widely used by threat actors to:
Trojan:Win32/GuLoader.RAZ!MTB
HEUR:Trojan.Win32.Makoob.gen
Trojan.GuLoader
Scr.NSISHeur!gen3
F54C3C32364C91454BEA24A1E6B98713
4668DC8468E677499828C63E313945125134803D6C96FE431BB71C332A64BE49
%TEMP%\System.dll
HKCU\Software\Locales Approx
HKCU\washoan\Uninstall\blodfattigste
HKCU\bowline\elice\lseplaners
wmlaunch.exe
slui.exe
Processes
Process 2040 –
Process 5612 –
Process 7092 –
This real-world attack shows how easily cybercriminals can blend into daily business communication. The email successfully bypassed:
The payload, GuLoader, delivered stealthy second-stage malware using:
This incident is a stark reminder that security is not just about technology — it’s about awareness. Even the most well-crafted emails must be scrutinized, especially when they include executable attachments.